Vulnerabilities > CVE-2007-3379 - Denial-Of-Service vulnerability in Enterprise Linux for SAP

047910
CVSS 2.1 - LOW
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
local
low complexity
redhat

Summary

Unspecified vulnerability in the kernel in Red Hat Enterprise Linux (RHEL) 4 on the x86_64 platform allows local users to cause a denial of service (OOPS) via unspecified vectors related to the get_gate_vma function and the fuser command.

Vulnerable Configurations

Part Description Count
OS
Redhat
4

Oval

accepted2013-04-29T04:05:35.621-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
descriptionUnspecified vulnerability in the kernel in Red Hat Enterprise Linux (RHEL) 4 on the x86_64 platform allows local users to cause a denial of service (OOPS) via unspecified vectors related to the get_gate_vma function and the fuser command.
familyunix
idoval:org.mitre.oval:def:10426
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleUnspecified vulnerability in the kernel in Red Hat Enterprise Linux (RHEL) 4 on the x86_64 platform allows local users to cause a denial of service (OOPS) via unspecified vectors related to the get_gate_vma function and the fuser command.
version26

Redhat

advisories
  • bugzilla
    id233170
    titleAdd 0x292c to PCI ID for ICH9
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 4 is installed
        ovaloval:com.redhat.rhba:tst:20070304025
      • OR
        • commentkernel earlier than 0:2.6.9-55.EL is currently running
          ovaloval:com.redhat.rhba:tst:20070304023
        • commentkernel earlier than 0:2.6.9-55.EL is set to boot up on next boot
          ovaloval:com.redhat.rhba:tst:20070304024
      • OR
        • AND
          • commentkernel-doc is earlier than 0:2.6.9-55.EL
            ovaloval:com.redhat.rhba:tst:20070304001
          • commentkernel-doc is signed with Red Hat master key
            ovaloval:com.redhat.rhba:tst:20070304002
        • AND
          • commentkernel-smp is earlier than 0:2.6.9-55.EL
            ovaloval:com.redhat.rhba:tst:20070304003
          • commentkernel-smp is signed with Red Hat master key
            ovaloval:com.redhat.rhba:tst:20070304004
        • AND
          • commentkernel-xenU is earlier than 0:2.6.9-55.EL
            ovaloval:com.redhat.rhba:tst:20070304005
          • commentkernel-xenU is signed with Red Hat master key
            ovaloval:com.redhat.rhba:tst:20070304006
        • AND
          • commentkernel-largesmp-devel is earlier than 0:2.6.9-55.EL
            ovaloval:com.redhat.rhba:tst:20070304007
          • commentkernel-largesmp-devel is signed with Red Hat master key
            ovaloval:com.redhat.rhba:tst:20070304008
        • AND
          • commentkernel-largesmp is earlier than 0:2.6.9-55.EL
            ovaloval:com.redhat.rhba:tst:20070304009
          • commentkernel-largesmp is signed with Red Hat master key
            ovaloval:com.redhat.rhba:tst:20070304010
        • AND
          • commentkernel-smp-devel is earlier than 0:2.6.9-55.EL
            ovaloval:com.redhat.rhba:tst:20070304011
          • commentkernel-smp-devel is signed with Red Hat master key
            ovaloval:com.redhat.rhba:tst:20070304012
        • AND
          • commentkernel-xenU-devel is earlier than 0:2.6.9-55.EL
            ovaloval:com.redhat.rhba:tst:20070304013
          • commentkernel-xenU-devel is signed with Red Hat master key
            ovaloval:com.redhat.rhba:tst:20070304014
        • AND
          • commentkernel-devel is earlier than 0:2.6.9-55.EL
            ovaloval:com.redhat.rhba:tst:20070304015
          • commentkernel-devel is signed with Red Hat master key
            ovaloval:com.redhat.rhba:tst:20070304016
        • AND
          • commentkernel is earlier than 0:2.6.9-55.EL
            ovaloval:com.redhat.rhba:tst:20070304017
          • commentkernel is signed with Red Hat master key
            ovaloval:com.redhat.rhba:tst:20070304018
        • AND
          • commentkernel-hugemem is earlier than 0:2.6.9-55.EL
            ovaloval:com.redhat.rhba:tst:20070304019
          • commentkernel-hugemem is signed with Red Hat master key
            ovaloval:com.redhat.rhba:tst:20070304020
        • AND
          • commentkernel-hugemem-devel is earlier than 0:2.6.9-55.EL
            ovaloval:com.redhat.rhba:tst:20070304021
          • commentkernel-hugemem-devel is signed with Red Hat master key
            ovaloval:com.redhat.rhba:tst:20070304022
    rhsa
    idRHBA-2007:0304
    released2007-04-28
    severityNone
    titleRHBA-2007:0304: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 5 (None)
  • rhsa
    idRHBA-2007-0304
rpms
  • kernel-0:2.6.9-55.EL
  • kernel-debuginfo-0:2.6.9-55.EL
  • kernel-devel-0:2.6.9-55.EL
  • kernel-doc-0:2.6.9-55.EL
  • kernel-hugemem-0:2.6.9-55.EL
  • kernel-hugemem-devel-0:2.6.9-55.EL
  • kernel-largesmp-0:2.6.9-55.EL
  • kernel-largesmp-devel-0:2.6.9-55.EL
  • kernel-smp-0:2.6.9-55.EL
  • kernel-smp-devel-0:2.6.9-55.EL
  • kernel-xenU-0:2.6.9-55.EL
  • kernel-xenU-devel-0:2.6.9-55.EL